نتایج جستجو برای: covert channel

تعداد نتایج: 228225  

2009
Sebastian Zander Philip Branch Grenville Armitage

Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing overt data transmissions to carry hidden messages. Recently, Murdoch proposed a temperature-based covert channel where information is transmitted by remotely inducing and measuring changes of temperature of an intermediate/target host. The channel was invented mai...

Journal: :IEEE journal on selected areas in information theory 2021

We consider the problem of communication over a continuous-time Poisson channel subject to covertness constraint: The relative entropy between output distributions when message is transmitted and no input provided must be small. In absence both bandwidth peak-power constraints, we show covert capacity this channel, in nats per second, infinity. When constraint imposed on input, becomes zero, “s...

Journal: :Computers & Mathematics with Applications 2012

2011
M. A. Ngadi S. N. Omar I. Ahmedy

Covert Channel are the methods to conceal a message in the volatile medium carrier such as radio signal and network packets. Until now, covert channels based on the packet length produce abnormal packet length when the length of the message is long. Abnormal packet length, especially in the normal network will expose the covert channels to network security perimeter. Therefore, it motivates the...

Journal: :Security and Communication Networks 2016

Journal: :IEEE Access 2022

The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable more secure than ever. A channel is a path through which secret messages can be leaked by violating system security policy. detection such dangerous, unwatchable, hidden threats still one the most challenging aspects. This threat exploits methods ...

2004
YAO WANG MINGZENG HU BIN LI

Covert channels and tunneling approaches are becoming a severe threat to information security. Penetration tools are employed to transit sensitive information through authorized streams. Since many current solutions are based on expert’s experiences or latter-wit, a self-learning detection and analysis system is starved for. A data mining framework for Covert Channel Detection and Analysis Syst...

Journal: :Electronic Proceedings in Theoretical Computer Science 2011

2008
David L. Bradley Kyle M. Becker

The long-term goal of this work is an integrated defense system that provides protection of Navy assets, while in port, from the threat posed by covert swimmers. The general concept is to hail, deter, and/or incapacitate the threat by directing a controlled level of low-frequency acoustic energy at the target location. At the system level, the concept requires combining elements of target detec...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Loïc Hélouët Marc Zeitoun Aldric Degorre

Covert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system’s profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید